On the Minimal Assumptions of Group Signature Schemes / Michel Abdalla ; Bogdan Warinschi |
Perfect Concurrent Signature Schemes / Willy Susilo ; Yi Mu ; Fangguo Zhang |
New Identity-Based Ring Signature Schemes / Javier Herranz ; Germán Sáez |
On the Security of a Multi-party Certified Email Protocol / Jianying Zhou |
Robust Metering Schemes for General Access Structures / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel |
PAYFLUX - Secure Electronic Payment in Mobile AdHoc Networks / Klaus Herrmann ; Michael A. Jaeger |
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN / Tieyan Li ; Yongdong Wu ; Di Ma ; Huafei Zhu ; Robert H. Deng |
Provably Secure Authenticated Tree Based Group Key Agreement / Ratna Dutta ; Rana Barua ; Palash Sarkar |
Taxonomic Consideration to OAEP Variants and Their Security / Yuichi Komano ; Kazuo Ohta |
Factorization-Based Fail-Stop Signatures Revisited / Katja Schmidt-Samoa |
A Qualitative Evaluation of Security Patterns / Spyros T. Halkidis ; Alexander Chatzigeorgiou ; George Stephanides |
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases / Yasunori Ishihara ; Yumi Shimakawa ; Toru Fujiwara |
Volatile Memory Computer Forensics to Detect Kernel Level Compromise / Sandra Ring ; Eric Cole |
A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet / Ilanit Moodahi ; Ehud Gudes ; Oz Lavee ; Amnon Meisels |
Hydan: Hiding Information in Program Binaries / Rakan El-Khalil ; Angelos D. Keromytis |
A Semi-fragile Steganographic Digital Signature for Images / Luke Hebbes ; Andrew Lenaghan |
Identification of Traitors Using a Trellis / Marcel Fernandez ; Miguel Soriano |
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation / Joaquin Garcia ; Fabien Autrel ; Joan Borrell ; Sergio Castillo ; Frederic Cuppens ; Guillermo Navarro |
Reflector Attack Traceback System with Pushback Based iTrace Mechanism / Hyung-Woo Lee ; Sung-Hyun Yun ; Taekyoung Kwon ; Jae-Sung Kim ; Hee-Un Park ; Nam-Ho Oh |
Automatic Covert Channel Analysis of a Multilevel Secure Component / Ruggero Lanotte ; Andrea Maggiolo-Schettini ; Simone Tini ; Angelo Troina ; Enrico Tronci |
Sound Approximations to Diffie-Hellman Using Rewrite Rules / Christopher Lynch ; Catherine Meadows |
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks / Anton Kargl ; Gotz Wiesend |
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm / Sang Gyoo Sim ; Dong Jin Park ; Pil Joong Lee |
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure / Dong-Guk Han ; Tetsuya Izu ; Jongin Lim ; Kouichi Sakurai |
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Jari Veijalainen |
Threat Analysis on NEtwork MObility (NEMO) / Souhwan Jung ; Fan Zhao ; S. Felix Wu ; HyunGon Kim |
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept / Michelangelo Giansiracusa ; Selwyn Russell ; Andrew Clark ; Volker Roth |
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) / Tao Wan ; Evangelos Kranakis ; Paul C. van Oorschot |
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management / Miodrag J. Mihaljevic ; Marc P.C. Fossorier ; Hideki Imai |
Security Analysis of the Generalized Self-shrinking Generator / Bin Zhang ; Hongjun Wu ; Dengguo Feng ; Feng Bao |
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis / Bo-Yin Yang ; Jiun-Ming Chen ; Nicolas T. Courtois |
On Some Weak Extensions of AES and BES / Jean Monnerat ; Serge Vaudenay |
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario / Slobodan Petrovic ; Amparo Fúster-Sabater |
Transient Fault Induction Attacks on XTR / Mathieu Ciet ; Christophe Giraud |
Adaptive-CCA on OpenPGP Revisited / Hsi-Chung Lin ; Sung-Ming Yen ; Guan-Ting Chen |
A New Key-Insulated Signature Scheme / Nicolás González-Deleito ; Olivier Markowitch ; Emmanuel Dall'Olio |
Secure Hierarchical Identity Based Signature and Its Application / Sherman S.M. Chow ; Lucas C.K. Hui ; Siu Ming Yiu ; K.P. Chow |
Multi-designated Verifiers Signatures / Fabien Laguillaumie ; Damien Vergnaud |
Dynamic Access Control for Multi-privileged Group Communications |
An Efficient Authentication Scheme Using Recovery Information in Signature / Kihun Hong |
Time-Scoped Searching of Encrypted Audit Logs / Darren Davis ; Fabian Monrose ; Michael K. Reiter |
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems / Habtamu Abie ; PÃ¥l Spilling ; Bent Foyn |
Author Index |
On the Minimal Assumptions of Group Signature Schemes / Michel Abdalla ; Bogdan Warinschi |
Perfect Concurrent Signature Schemes / Willy Susilo ; Yi Mu ; Fangguo Zhang |
New Identity-Based Ring Signature Schemes / Javier Herranz ; Germán Sáez |